Analysis
-
max time kernel
140s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/07/2024, 08:23
Behavioral task
behavioral1
Sample
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe.zip
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe.zip
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
out.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
out.exe
Resource
win10v2004-20240709-en
General
-
Target
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe
-
Size
34KB
-
MD5
30307b00be237bf18d80f68dc26cb659
-
SHA1
f1bb4b4d82d9bd37455326d0e68c8907ed852107
-
SHA256
62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41
-
SHA512
a123fc5f3dc4cbe4d3f727e8c6ae54a99cc07660519e21aa7205df7b4e666129883526f4a981388c771bf6b7cca2596bc319993bbaecb79f599e5513b8cc49ba
-
SSDEEP
768:EqBXsYbaKzHsEcX/55DcLKhClYWvo2XP+/rp750:EqBXsYbTHsEcv55ILkCbv9O90
Malware Config
Signatures
-
resource yara_rule behavioral3/memory/2376-0-0x0000000000400000-0x0000000000419000-memory.dmp upx behavioral3/memory/2376-1-0x0000000000400000-0x0000000000419000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: 33 2376 62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe Token: SeIncBasePriorityPrivilege 2376 62e8d9aa8c44dbbc14b15e4a1d2c652d2d2f65f00bae6c77221ae6a4a686ee41.exe